A solution for security check and on-site audit
Main Functions of SecuIN Enterprise
Check the PC security setting and identify vulnerabilities against external threats such as hackingFunction | Description |
---|---|
Password policy | Check stability of system password such as minimum password length and usage period |
Firewall setting | Check whether system firewall is set or not |
Screen saver check | Check whether screen save is set and whether password is authenticated when returning |
Multiple OS check | Check whether an OS other than the basic OS of the company is installed |
Vaccine status check | Check whether vaccine is installed and whether it is running |
Windows update check | Check whether the latest Windows update is installed |
Shared folder history | Check the details of shared folder set in the system |
Network drive history | Check the details of shared driver connected to the system |
Wireless network connection history | Wireless network connection history Check details of wireless AP connected in the system |
Installed program list check | Check the list of programs installed in the system and whether unauthorized programs are installed |
Process list check | Check details of running process and whether unauthorized processes are running |
Recoverable file list check | Check list of files erased files that remain recoverable on the drive |
Management of USB storage media | Automatically collect information on USB storage media connected to PC Batch deletion of connectionhistory Manage files moved to storage media Block unauthorized use of USB storage media |
Risk management in PC document storage | Check document storage status Check whether documents containing confidential/personal informationare stored Batch deletion if necessary |
Effective investigation | Clear time series analysis of collected information Analysis function for detailed investigation at self-investigation |
Efficientmanagement | Periodic reporting of analysis results Trend check through management console Quantify complementary status Immediate response to situation |
Running process | Analysis by runningprocess Analysis of business by process Analysis of process use history |
Internet use | Identify connection status Analyze business or non-business nature by access site Analyze cache, history, bookmarks and access history, etc. Time-series analysis by date Digital data analysis on PC without network tap |
Printing spool | Manage printouts Analyze digital data for operating system Spool |
Analysis of mail clients Immediate investigation into problem situation Clear time-series analysis of the collected information Analysis function that enables detailed investigation at self-investigation |
Identification of Document Possession Status Containing Designated Pattern and Keywords
Check storage status of files that users do not know so that file containing important contents and personal informationare not neglectedInternet Usage
Check internet history on PC, display records of using prohibited internet sites and violations, time of visiting, URL information decodingQuantification of Security Status and Individual Analysis
Quantify 5 parts of personal security statusDocument security status check– tracking of important data travel path
Track travel path and delivery time of the important security document among personnelComprehensive Status and Report
Comprehensively check violation status and various other status.